Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.

Patents

  1. Advanced Patent Search
Publication numberUS20040044617 A1
Publication typeApplication
Application numberUS 10/640,213
Publication dateMar 4, 2004
Filing dateAug 12, 2003
Priority dateSep 3, 2002
Also published asCN1490754A
Publication number10640213, 640213, US 2004/0044617 A1, US 2004/044617 A1, US 20040044617 A1, US 20040044617A1, US 2004044617 A1, US 2004044617A1, US-A1-20040044617, US-A1-2004044617, US2004/0044617A1, US2004/044617A1, US20040044617 A1, US20040044617A1, US2004044617 A1, US2004044617A1
InventorsDuojia Lu
Original AssigneeDuojia Lu
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Methods and systems for enterprise risk auditing and management
US 20040044617 A1
Abstract
Embodiments of this invention relate to methods and systems for auditing, evaluating, and making an integrated assessment of risks associated with an enterprise, which may be measured relative to a set of industrial benchmarks. Embodiments of the invention can be used, for example, as a diagnostic tool that enables an enterprise to have a comprehensive view of various types of risks it is facing and their potential impact, as well as to test out effective ways to mitigate and manage the risks. Embodiments of the invention can also be integrated as part of an enterprise's asset management infrastructure. In addition, Embodiments of the invention can be used as a “risk auditor,” e.g., conducted regularly or on demand in a manner similar to how financial auditing is performed.
Images(5)
Previous page
Next page
Claims(20)
What is claimed is:
1. A method, comprising:
determining a context associated with an enterprise;
categorizing risks associated with the enterprise into a plurality of risk categories, each risk category including at least one risk;
determining a risk structure that correlates the risk categories; and
evaluating the risks associated with the enterprise.
2. The method of claim 1 wherein the risk categories include a plurality of financial, operational, strategic, and market risk categories.
3. The method of claim 2 further comprising at least one of regulatory, credit, liquidity, property, liability, intellectual property, and political risk categories.
4. The method of claim 1 wherein the risk structure includes a plurality of nodes configured in a tree-like hierarchical structure, each node corresponding to one of the risk categories.
5. The method of claim 4 wherein the tree-like hierarchical structure is configured to allow additional nodes to be added, each additional node corresponding to an additional risk category.
6. The method of claim 1 wherein the risk structure is dynamically reconfigurable.
7. The method of claim 1 further comprising using an interactive questionnaire to collect information related to the context associated with the enterprise.
8. The method of claim 1 further comprising applying statistical data to derive information related to the context associated with the enterprise.
9. The method of claim 1 wherein the evaluation includes constructing a probability distribution function for at least one of the risks.
10. The method of claim 9 further comprising constructing a set of scenarios associated with the at least one of the risks and assigning a probability value to each scenario.
11. The method of claim 1 wherein the evaluation includes defining at least one parameter associated with each risk.
12. The method of claim 1 wherein the evaluation includes assigning a score to at least one of the risks, the score being measured relative to a predetermined risk measurement unit.
13. The method of claim 12 further comprising determining an industry benchmark and using the industry benchmark as the risk measurement unit.
14. The method of claim 1 further comprising providing an integrated assessment of the risks associated with the enterprise, the integrated assessment based at least in part on the evaluation.
15. The method of claim 14 wherein the integrated assessment includes an assessment of a risk management strategy associated with the enterprise.
16. The method of claim 15 furthering comprising carrying out a “what-if” analysis so as to revise the risk management strategy.
17. A computer program product stored in a computer-readable medium and executable by a processor, the computer program product comprising instructions to:
determine a context associated with an enterprise;
categorize risks associated with the enterprise into a plurality of risk categories, each risk category including at least one risk;
determine a risk structure that correlates the risk categories; and
evaluate the risks associated with the enterprise.
18. The database of claim 17 wherein the computer program product is included in a database stored in the computer-readable medium.
19. The database of claim 17 wherein the computer-readable medium is included in a computer.
20. The database of claim 17 wherein the computer-readable medium resides on a network server.
Description
    CROSS REFERENCE TO RELATED APPLICATIONS
  • [0001]
    This application claims priority to U.S. Provisional Patent Application No. 60/407,791, filed Aug. 14, 2002, the entirety of which is hereby incorporated by reference.
  • FIELD OF THE INVENTION
  • [0002]
    This invention generally relates to risk management. In particular, it relates to a novel system and method for auditing and assessing risks associated with an enterprise, or a multi-level organization.
  • BACKGROUND
  • [0003]
    Risk is inherent in every business. Risk management has become an integral part of modem business operation, and plays a crucial role in an enterprise's asset management. Such stems from that every enterprise is established and operates for a purpose in the future; and risk is intimately associated with various uncertainties along the process. To navigate in an increasingly volatile business environment, it is imperative for an enterprise to regularly audit and actively manage its collective risks, as well as those related to its business partners (e.g., suppliers, clients, banks, insurance companies, etc.). In addition, various government regulatory agencies, shareholders, and financial institutions also demand to know how an enterprise deals with its risks.
  • [0004]
    Conventional risk management tools typically deal with a particular type of risks (e.g., credit risks), or risks associated with a single business process such as a software project. A business enterprise, by contrast, is a complex “eco-system,” in that it not only has multiple divisions/departments in a multi-level hierarchical structure, but also interacts with a number of external “sources” (such as its business partners and regulatory agencies) in a dynamic manner. Hence, associated with such system are multiple risk categories that are inter-related, and dynamic in nature.
  • [0005]
    In view of the forgoing, a need exists in the art for a method and system that can effectively perform risk auditing and management for an enterprise.
  • SUMMARY
  • [0006]
    Embodiments of this invention relate to methods and systems for auditing, evaluating, and making an integrated assessment of risks associated with an enterprise, e.g., based on various industrial benchmarks, and/or relative to a set of predetermined risk measurement units.
  • [0007]
    In one embodiment, a method for enterprise risk management comprises: determining a context associated with an enterprise; categorizing risks associated with the enterprise into a plurality of risk categories, each risk category including at least one risk; determining a risk structure that correlates the risk categories; and evaluating the risks associated with the enterprise. The method may further include providing an integrated assessment of the risks associated with the enterprise, based at least in part on the evaluation.
  • [0008]
    Embodiments of the invention can be used, for example, as a diagnostic tool that enables an enterprise to have a comprehensive view of various types of risks it is facing and their potential impact, as well as to test out effective ways to mitigate and manage the risks. Embodiments of the invention can also be integrated as part of an enterprise's asset management infrastructure. In addition, Embodiments of the invention can be used as a “risk auditor,” e.g., conducted regularly or on demand in a manner similar to how financial auditing is performed.
  • [0009]
    Further details and advantages of embodiments of the invention are set forth below.
  • BRIEF DESCRIPTION OF THE FIGURES
  • [0010]
    [0010]FIG. 1 depicts a flowchart illustrating one embodiment of the invention;
  • [0011]
    [0011]FIG. 2 illustrates how context, event and time are related in a scenario space, according to an embodiment of the invention;
  • [0012]
    [0012]FIG. 3 depicts an embodiment of a risk structure associated with an enterprise, according to the invention; and
  • [0013]
    [0013]FIG. 4 shows how a risk probability distribution function may be constructed, according to an embodiment of the invention.
  • DETAILED DESCRIPTION
  • [0014]
    [0014]FIG. 1 depicts a flowchart illustrating an embodiment of a method of the invention. Flowchart 100 comprises: determining a context associated with an enterprise, as recited in step 110; categorizing risks associated with an enterprise into a plurality of risk categories, each risk category including at least one risk, as recited in step 120; determining a risk structure that correlates the risk categories, as recited in step 130; and evaluating the risks associated with the enterprise, as recited in step 140.
  • [0015]
    As used herein, the term “risk” is construed broadly to include a situation in which, at a future time and relative to a projection (or “goal”), there are several possible results that may influential. Simply put, a risk represents the chance of deviation from the goal. A risk is characteristically context (or situation) sensitive, and dynamic in nature. A risk may include (but is not limited to) the following components: a time horizon or period (or “time domain”); a set of potential events or actions (or “event domain”); a set of potential results or outcomes; a projection of the results or outcomes (or “plan”), including the current resource allocation and belief; the entity for which different potential results or outcomes are meaningful (or “ownership”); the value of the results or outcomes that include both the objective value and the subjective value (or “value”). A risk may be for example related to a loss caused by a trade credit default, an indirect loss due to a catastrophe occurred to a sole supplier, a gain/loss in the market share of a new product or service, a decline in demand due to adverse weather conditions, an employee injury (occupational and non-occupational), or a direct or indirect damage caused by a man-made disaster.
  • [0016]
    The term “enterprise” is construed broadly to include any organization or organized entity, such as a business organization, a financial institution, an educational institution, a political party, a union, or a foundation. In general, an enterprise can be considered as a group of people organized for a certain purpose. An enterprise may have sub-organizational structures such as multiple divisions/departments, for example, arranged in a multi-level hierarchical structure.
  • [0017]
    The term “context” is construed to include information (or data) about an enterprise's situation at any given time. A context may be viewed, for example, as a “snapshot” of the enterprise at a given time. The context of an enterprise may be for example categorized into a number of categories, including (but not limited to): financial information, operational information, strategic information, regulatory information, and market information. It may further include information (or data) related to the enterprise's internal structure, as well as its external environment. The context of an enterprise may serve as a background for setting up a “scenario,” as described below.
  • [0018]
    As used herein, the term “scenario” refers to a possible path an enterprise may take between the present and a future time (or between two future times). A scenario may comprise one or more “events,” taking place along the path at various times. An “event” herein refers to the occurrence of a situation that may affect the evaluation of one or more risks. In general, when an event occurs, the context changes. Two scenarios may be considered identical, if they comprise the same events taking place at the same times. Examples of an event may include (but are not limited to): the occurrence of a fire, a Fed interest rate change, a law suit brought by a competitor (or a third party), the discontinuity of a product, a new product introduced to the market by a competitor, a power outage, and so on.
  • [0019]
    As a way of example, FIG. 2 illustrates how context, event, and time can be related in a “scenario space” 200, according to an embodiment of the invention. For example, curve 210 represents one scenario along which the context evolves from Context(0) at Time(0) to Context(1) at Time(1), by way of a plurality of intervening events including Event(0) and Event(1). As such, a scenario may provide a possible “roadmap” that leads the context from one time to another (e.g., from the present to the future), thereby rendering the context dynamic.
  • [0020]
    The context associated with an enterprise may be determined in a number of ways, as deemed appropriate for a given application. In one embodiment, an interactive questionnaire may be posed to a user (or “risk manager”), e.g., as a systematic and effective way to collect information/data in various categories. Other sources of information, such as historical or statistical data, executive intuition and judgment, etc., may also be utilized to derive additional context information. The content of the questionnaire may be further modified, based upon the risk manager's input. The questionnaire may also be used periodically to update the context information. The context information can also be updated at any time whenever the situation changes or an event occurs.
  • [0021]
    In the embodiment of FIG. 1, the risks associated with an enterprise may generally be categorized into a plurality of risk categories, including (but not limited to) financial, operational, strategic, and market risk categories. Each of these “top-level” categories may further comprise a plurality of sub-categories, such as regulatory, credit, liquidity, property, liability, intellectual property, and political risk categories. Under each sub-category, there may be additional subcategories, and so on.
  • [0022]
    In one embodiment, a hierarchical (e.g., “tree-like”) structure can be used as the “risk structure” to characterize how various risk categories described above are inter-connected (or correlated). FIG. 3 depicts an embodiment of a risk structure, according to the invention. By way of example, risk structure 300 may comprise a plurality of “nodes” configured in a tree-like hierarchical structure, where each node corresponds to a particular risk category. For example, nodes 310, 320, 330, 340 may correspond to financial, operational, strategic, and market risk categories, respectively. Node 310 may further include a plurality of “sub-nodes” 312, 314, 316, e.g., relating to regulatory, credit, and liquidity risk categories, respectively. Node 330 may further include a plurality of “sub-nodes” 332, 334, e.g., relating to intellectual property and political risk categories, respectively. Node 320 may further include a plurality of “sub-nodes” 322, 324, e.g., relating to liability and fire risk categories, respectively. The risk structure 300 can also be dynamically modified, e.g., one or more nodes representing additional risk categories can be added to the risk structure 300 via appropriate linkages. As such, a risk structure according to the invention provides a systematic overview of all the identifiable risks associated with an enterprise, along with their lineage and correlation, thus making it possible to provide an integrated risk assessment for the entire enterprise, as the ensuing description further describes.
  • [0023]
    Referring back to FIG. 1. The evaluation of the risks categories (along with the constituent risks in each category) may be carried out in a manner that yields appropriate results for a given application. In some applications, for example, it may be desirable to evaluate the risks in a quantitative fashion, such that each obtains a “score,” e.g., measured relative to a predetermined risk measurement unit (e.g., a corresponding industry benchmark). In other applications, some risks may be evaluated in a qualitative manner, e.g., measured by a “high” or “low.”
  • [0024]
    In one embodiment of the invention, the risk measurement units associated with various risks can be determined by identifying at least one “reference case,” such as an industry leader and/or an industry laggard (or “failure”). A method of the invention such as the embodiment of FIG. 1 is then applied to the industry leader/laggard and the associated risks are evaluated (e.g., by devising a suitable evaluation procedure). The risk evaluations thus obtained (e.g., a set of “reference scores”) can be used as a set of “industry benchmarks” and thus serve as the “risk measurement units.” Subsequently, the risk evaluation procedure devised for the above reference case can be applied to an enterprise of interest, and a set of scores are obtained for various risk categories (and the constituent risks) accordingly, which are effectively measured relative to the respective risk measurement units. As such, use of such risk measurement units (e.g., industry benchmarks) provide a standardized comparison, which can be useful in identifying and mitigating those risks that are adverse to the enterprise's strategic plan and desired goals.
  • [0025]
    In one embodiment, a probability distribution function may be constructed for each risk. This may be accomplished by constructing all possible scenarios (along with the underlying events) associated with the risk and assigning a probability value to each scenario. Such process may involve for example making use of historical and statistical data, applying industry benchmarks, taking into account executive intuition and judgment, carrying out simulations, and so on.
  • [0026]
    As a way of example, FIG. 4 illustrates a probability distribution function 410, in a “probability space” 400, where Probability (associated with a Risk R) is plotted as a function of Scenario, at a particular value Li of Gain/Loss. Also shown in FIG. 4 is a probability distribution function 420, where Probability (Risk R) is plotted as a function of Gain/Loss, at a particular scenario Si. An integration of the probability distribution function 420 along the Gain/Loss axis yields a probability value for the scenario Si (associated with the Risk R) over all gain/loss values. Whereas an integration of the probability distribution function 410 along the Scenario axis yields a probability value for Risk R at the gain/loss Li.
  • [0027]
    One or more parameters can be further defined for each risk, which may for example serve as some “constraints” to the risk under consideration. For instance, the parameters may be geographical, organizational, or time limits. They may also be related to revenue growth, profit growth, loss limit, cash flow, etc. The parameters can be further used to indicate how the risk is to be measured. For example, a criterion for a risk related to fire loss may be set at above $1000 level, such that a loss below $1000 will be retained by the enterprise, while a loss above $1000 will be transferred by an insurance program.
  • [0028]
    Furthermore, a parameter may be use to represent a “weight” associated with a “lower-level” risk such as a risk in a sub-category (e.g., corresponding to a sub-node 312, 314, or 316 in FIG. 3). The “weight” can be useful in determining how the lower-level risks are aggregated to their “parent” (on an upper level) category (such as the node 310 of FIG. 3), for the lower-level risks contribute to the upper-level risk metrics.
  • [0029]
    In addition, a “risk exposure” may be defined for each risk, e.g., to restrict the risk evaluation in a particular range. For example, a risk exposure may be used to cut off (or filter out) events/scenarios or risk probability values that are too insignificant (or small) to be practically meaningful. This can be useful in a complex evaluation process. In the embodiment of FIG. 4, for example, a risk exposure for Risk R may be set up such to cover the section of the probability distribution function 410 where Probability is greater than a certain value (e.g., 10%).
  • [0030]
    The embodiment of FIG. 1 can be used to carry out a “what-if” risk analysis, where various scenarios and assumptions are played out and the associated risks are evaluated, for instance. Such analysis enables various risks to be monitored and managed in a proactive manner, and can be beneficial for the enterprise strategic planning.
  • [0031]
    The flowchart 100 of FIG. 1 may further include providing an integrated assessment of the risks associated with the enterprise, based at least in part on the evaluation, as recited in step 150. For example, based on the results of the evaluation step 140 (e.g., a set of scores measured relative to a set of risk measurement units such as industry benchmarks), the enterprise's existing risk management strategy can be examined, and ineffective areas identified. Furthermore, a “what-if” analysis as described above may be carried out to help devise a more effective and coherent strategy. In addition, various plans/strategies related to risk retention, risk financing, risk avoidance, risk prevention, risk transfer, risk hedging, and other means of risk management can be tested out and devised accordingly.
  • [0032]
    The methods and systems of the invention can be used in a variety of applications, e.g., providing effective risk auditing and management for various organizations. In one embodiment, a database (or other computer program products) may be constructed, e.g., based on the embodiment of FIG. 1, where the related context information, the risk categories, the risk structure are stored. Various data associated with the risk evaluation process (e.g., scenarios along with events and risk probability distribution functions constructed, risk parameters and risk exposures defined, risk measurement units determined, etc.), along with the results of the evaluation (e.g., a set of scores) can also be stored. The database may be maintained/administered internally (e.g., by a risk manager), and/or externally (e.g., by an outside consulting agency). The database can be updated on a regularly basis, on demand, and/or when an event occurs (e.g., a Fed interest rate change). The risk evaluation and assessment are performed accordingly, as well. Such a database (or any other systems in accordance with the invention) can effectively serve as a “risk auditor,” e.g., allowing the risk management to be audited/assessed regularly or on demand, in a manner similar to how financial management is audited.
  • [0033]
    The database (or other computer program products) in the above can be stored in a memory or a computer-readable medium, in communication with a processor (e.g., embodied in a computer or a processing unit, or a network server). Embodiments of a computer-readable medium include, but are not limited to, an electronic, optical, magnetic, or other storage or transmission device capable of providing a processor with computer-readable (or machine-readable) instructions. Other examples of suitable media include, but are not limited to, a floppy disk, CD-ROM, magnetic disk, memory chip, ROM, RAM, an ASIC, a configured processor, all optical media, all magnetic tape or other magnetic media, or any other medium from which a processor can read instructions. Also, various other forms of computer-readable media may transmit or carry instructions to a computer, including a router, a private or public network, or other transmission device or channel wired and/or wireless. The instructions may comprise code from any computer-programming language, including, for example, C, C++, Visual Basic, Java, and JavaScript.
  • [0034]
    The foregoing description of various embodiments of the invention has been presented only for the purpose of illustration and description, and is not intended to be exhaustive or to limit the invention to the specific forms disclosed. Numerous modifications and adaptations thereof will be apparent to those skilled in the art without departing from the spirit and scope of the invention.
Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US5692501 *Jun 6, 1995Dec 2, 1997Minturn; PaulScientific wellness personal/clinical/laboratory assessments, profile and health risk managment system with insurability rankings on cross-correlated 10-point optical health/fitness/wellness scales
US20010011243 *Mar 20, 2001Aug 2, 2001Ron DemboRisk management system, distributed framework and method
US20020032646 *Sep 7, 2001Mar 14, 2002Francis SweeneySystem and method of automated brokerage for risk management services and products
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US7693766Apr 6, 2010Weather Risk Solutions LlcFinancial activity based on natural events
US7711636Sep 27, 2006May 4, 2010Experian Information Solutions, Inc.Systems and methods for analyzing data
US7742982Oct 12, 2007Jun 22, 2010Experian Marketing Solutions, Inc.Systems and methods for determining thin-file records and determining thin-file risk levels
US7783542Oct 31, 2007Aug 24, 2010Weather Risk Solutions, LlcFinancial activity with graphical user interface based on natural peril events
US7783543Aug 24, 2010Weather Risk Solutions, LlcFinancial activity based on natural peril events
US7783544Oct 31, 2007Aug 24, 2010Weather Risk Solutions, LlcFinancial activity concerning tropical weather events
US7801812Mar 12, 2007Sep 21, 2010Vantagescore Solutions, LlcMethods and systems for characteristic leveling
US7809634 *Jul 7, 2005Oct 5, 2010Bierc Gary JEnterprise-wide total cost of risk management using ARQ
US7831488Apr 30, 2004Nov 9, 2010Capital Confirmation, Inc.Systems, methods and computer readable medium providing automated third-party confirmations
US7885841Jan 5, 2006Feb 8, 2011Oracle International CorporationAudit planning
US7899693Jun 17, 2003Mar 1, 2011Oracle International CorporationAudit management workbench
US7917420Jul 31, 2009Mar 29, 2011Weather Risk Solutions LlcGraphical user interface for financial activity concerning tropical weather events
US7917421Mar 29, 2011Weather Risk Solutions LlcFinancial activity based on tropical weather events
US7930242Mar 12, 2007Apr 19, 2011Vantagescore Solutions, LlcMethods and systems for multi-credit reporting agency data modeling
US7941353May 10, 2011Oracle International CorporationImpacted financial statements
US7974919Aug 9, 2010Jul 5, 2011Vantagescore Solutions, LlcMethods and systems for characteristic leveling
US7975299Jul 5, 2011Consumerinfo.Com, Inc.Child identity monitor
US7991689Aug 2, 2011Experian Information Solutions, Inc.Systems and methods for detecting bust out fraud using credit data
US7996521Nov 19, 2007Aug 9, 2011Experian Marketing Solutions, Inc.Service for mapping IP addresses to user segments
US8001042Oct 13, 2010Aug 16, 2011Experian Information Solutions, Inc.Systems and methods for detecting bust out fraud using credit data
US8005709Jun 17, 2003Aug 23, 2011Oracle International CorporationContinuous audit process control objectives
US8024264Sep 20, 2011Experian Marketing Solutions, Inc.Systems and methods for determining thin-file records and determining thin-file risk levels
US8036979Oct 5, 2007Oct 11, 2011Experian Information Solutions, Inc.System and method for generating a finance attribute from tradeline data
US8055563Nov 8, 2011Weather Risk Solutions, LlcFinancial activity based on natural weather events
US8055579Nov 8, 2011Vantagescore Solutions, LlcMethods and systems for score consistency
US8165907 *Dec 7, 2004Apr 24, 2012Swiss Reinsurance Company Ltd.System and method for automated risk determination and/or optimization of the service life of technical facilities
US8214262Aug 13, 2010Jul 3, 2012Lower My Bills, Inc.System and method of enhancing leads
US8214274Jul 3, 2012Weather Risk Solutions, LlcFinancial activity based on natural events
US8266042Aug 6, 2008Sep 11, 2012Weather Risk Solutions, LlcFinancial activity based on natural peril events
US8271378Sep 18, 2012Experian Marketing Solutions, Inc.Systems and methods for determining thin-file records and determining thin-file risk levels
US8296167Jun 17, 2003Oct 23, 2012Nigel KingProcess certification management
US8301574Sep 17, 2007Oct 30, 2012Experian Marketing Solutions, Inc.Multimedia engagement study
US8315943Oct 5, 2011Nov 20, 2012Experian Information Solutions, Inc.System and method for generating a finance attribute from tradeline data
US8336026Dec 18, 2012International Business Machines CorporationSupporting a work packet request with a specifically tailored IDE
US8364588Sep 2, 2010Jan 29, 2013Experian Information Solutions, Inc.System and method for automated detection of never-pay data sets
US8370188Feb 5, 2013International Business Machines CorporationManagement of work packets in a software factory
US8375370 *Feb 12, 2013International Business Machines CorporationApplication/service event root cause traceability causal and impact analyzer
US8407073Aug 25, 2010Mar 26, 2013International Business Machines CorporationScheduling resources from a multi-skill multi-level human resource pool
US8418126Jul 23, 2008Apr 9, 2013International Business Machines CorporationSoftware factory semantic reconciliation of data models for work packets
US8442953May 14, 2013Goldman, Sachs & Co.Method, system, apparatus, program code and means for determining a redundancy of information
US8448129Jul 31, 2008May 21, 2013International Business Machines CorporationWork packet delegation in a software factory
US8452629Jul 15, 2008May 28, 2013International Business Machines CorporationWork packet enabled active project schedule maintenance
US8510300Sep 15, 2004Aug 13, 2013Goldman, Sachs & Co.Systems and methods for managing information associated with legal, compliance and regulatory risk
US8527329Jul 15, 2008Sep 3, 2013International Business Machines CorporationConfiguring design centers, assembly lines and job shops of a global delivery network into “on demand” factories
US8533322Mar 22, 2012Sep 10, 2013Experian Marketing Solutions, Inc.Service for associating network users with profiles
US8538865 *Aug 24, 2006Sep 17, 2013The Hartford Steam Boiler Inspection And Insurance Co.Method of determining prior net benefit of obtaining additional risk data for insurance purposes via survey or other procedure
US8560434Mar 12, 2007Oct 15, 2013Vantagescore Solutions, LlcMethods and systems for segmentation using multiple dependent variables
US8595044May 29, 2008Nov 26, 2013International Business Machines CorporationDetermining competence levels of teams working within a software
US8606626Jan 30, 2008Dec 10, 2013Experian Information Solutions, Inc.Systems and methods for providing a direct marketing campaign planning environment
US8626646Sep 14, 2012Jan 7, 2014Experian Information Solutions, Inc.System and method for generating a finance attribute from tradeline data
US8660878Jun 15, 2011Feb 25, 2014International Business Machines CorporationModel-driven assignment of work to a software factory
US8667469May 29, 2008Mar 4, 2014International Business Machines CorporationStaged automated validation of work packets inputs and deliverables in a software factory
US8671007Mar 5, 2013Mar 11, 2014International Business Machines CorporationWork packet enabled active project management schedule
US8694969Jun 8, 2012Apr 8, 2014International Business Machines CorporationAnalyzing factory processes in a software factory
US8706614Dec 7, 2007Apr 22, 2014Goldman, Sachs & Co.Systems and methods for automated political risk management
US8712813Dec 21, 2010Apr 29, 2014Oracle International CorporationAudit planning
US8738515Sep 14, 2012May 27, 2014Experian Marketing Solutions, Inc.Systems and methods for determining thin-file records and determining thin-file risk levels
US8762191Sep 15, 2004Jun 24, 2014Goldman, Sachs & Co.Systems, methods, apparatus, and schema for storing, managing and retrieving information
US8782598Sep 12, 2012Jul 15, 2014International Business Machines CorporationSupporting a work packet request with a specifically tailored IDE
US8793151 *Aug 28, 2009Jul 29, 2014Src, Inc.System and method for organizational risk analysis and reporting by mapping detected risk patterns onto a risk ontology
US8793171 *Jan 19, 2011Jul 29, 2014Equitynet, LlcElectronic system for analyzing the risk of an enterprise
US8843411Jan 4, 2012Sep 23, 2014Goldman, Sachs & Co.Gaming industry risk management clearinghouse
US8996481 *Sep 15, 2004Mar 31, 2015Goldman, Sach & Co.Method, system, apparatus, program code and means for identifying and extracting information
US9058340Sep 9, 2013Jun 16, 2015Experian Marketing Solutions, Inc.Service for associating network users with profiles
US9058581Aug 9, 2013Jun 16, 2015Goldman, Sachs & Co.Systems and methods for managing information associated with legal, compliance and regulatory risk
US9063985May 10, 2013Jun 23, 2015Goldman, Sachs & Co.Method, system, apparatus, program code and means for determining a redundancy of information
US9110916Mar 31, 2014Aug 18, 2015Lower My Bills, Inc.System and method of removing duplicate leads
US9251541Dec 18, 2012Feb 2, 2016Experian Information Solutions, Inc.System and method for automated detection of never-pay data sets
US20020143562 *Apr 2, 2001Oct 3, 2002David LawrenceAutomated legal action risk management
US20030225687 *Jun 6, 2003Dec 4, 2003David LawrenceTravel related risk management clearinghouse
US20030233319 *Jun 11, 2003Dec 18, 2003David LawrenceElectronic fund transfer participant risk management clearing
US20040143446 *Jul 22, 2003Jul 22, 2004David LawrenceLong term care risk management clearinghouse
US20040193532 *Feb 10, 2004Sep 30, 2004David LawrenceInsider trading risk management
US20040260566 *Jun 17, 2003Dec 23, 2004Oracle International CorporationAudit management workbench
US20040260582 *Jun 17, 2003Dec 23, 2004Oracle International CorporationContinuous audit process control objectives
US20040260583 *Jun 17, 2003Dec 23, 2004Oracle International CorporationProcess certification management
US20040260591 *Jun 17, 2003Dec 23, 2004Oracle International CorporationBusiness process change administration
US20040260634 *Jun 17, 2003Dec 23, 2004Oracle International CorporationImpacted financial statements
US20050209899 *Mar 16, 2004Sep 22, 2005Oracle International CorporationSegregation of duties reporting
US20060004719 *Sep 15, 2004Jan 5, 2006David LawrenceSystems and methods for managing information associated with legal, compliance and regulatory risk
US20060004814 *Sep 15, 2004Jan 5, 2006David LawrenceSystems, methods, apparatus, and schema for storing, managing and retrieving information
US20060004866 *Sep 15, 2004Jan 5, 2006David LawrenceMethod, system, apparatus, program code and means for identifying and extracting information
US20060004878 *Sep 15, 2004Jan 5, 2006David LawrenceMethod, system, apparatus, program code and means for determining a redundancy of information
US20060059026 *Aug 24, 2004Mar 16, 2006Oracle International CorporationCompliance workbench
US20060074739 *Sep 20, 2004Apr 6, 2006Oracle International CorporationIdentifying risks in conflicting duties
US20060089861 *Oct 22, 2004Apr 27, 2006Oracle International CorporationSurvey based risk assessment for processes, entities and enterprise
US20060155627 *Dec 20, 2005Jul 13, 2006Horowitz Kenneth AFinancial activity based on natural events
US20060155628 *Dec 20, 2005Jul 13, 2006Horowitz Kenneth AFinancial activity based on tropical weather events
US20070043662 *Aug 24, 2006Feb 22, 2007The Hartford Steam Boiler Inspection And InsuranceMethod of determining prior net benefit of obtaining additional risk data for insurance purposes via survey or other procedure
US20070156495 *Jan 5, 2006Jul 5, 2007Oracle International CorporationAudit planning
US20070214076 *Sep 27, 2006Sep 13, 2007Experian-Scorex, LlcSystems and methods for analyzing data
US20070255645 *Mar 12, 2007Nov 1, 2007Sherri MorrisMethods and Systems for Segmentation Using Multiple Dependent Variables
US20070255646 *Mar 12, 2007Nov 1, 2007Sherri MorrisMethods and Systems for Multi-Credit Reporting Agency Data Modeling
US20070282736 *Mar 12, 2007Dec 6, 2007Marie ConlinMethods and Systems for Characteristic Leveling
US20080033852 *Oct 24, 2005Feb 7, 2008Megdal Myles GComputer-based modeling of spending behaviors of entities
US20080065521 *Oct 31, 2007Mar 13, 2008Horowitz Kenneth AFinancial activity based on natural peril events
US20080071589 *Aug 14, 2006Mar 20, 2008Sap AgEvaluating Development of Enterprise Computing System
US20080077457 *Dec 7, 2004Mar 27, 2008Swiss Reinsurance CompanySystem and Method for Automated Risk Determination and/or Optimization of the Service Life of Technical Facilities
US20080133429 *Oct 31, 2007Jun 5, 2008Horowitz Kenneth AFinancial activity with graphical user interface based on natural peril events
US20080133430 *Oct 31, 2007Jun 5, 2008Horowitz Kenneth AFinancial activity concerning tropical weather events
US20080183519 *Jul 31, 2007Jul 31, 2008Oracle International CorporationBusiness process for ultra vires transactions
US20080221971 *Oct 25, 2007Sep 11, 2008Megdal Myles GUsing commercial share of wallet to rate business prospects
US20080221973 *Oct 25, 2007Sep 11, 2008Megdal Myles GUsing commercial share of wallet to rate investments
US20080228540 *Oct 25, 2007Sep 18, 2008Megdal Myles GUsing commercial share of wallet to compile marketing company lists
US20080228541 *Oct 25, 2007Sep 18, 2008Megdal Myles GUsing commercial share of wallet in private equity investments
US20080255975 *Oct 12, 2007Oct 16, 2008Anamitra ChaudhuriSystems and methods for determining thin-file records and determining thin-file risk levels
US20080294540 *May 22, 2008Nov 27, 2008Celka Christopher JSystem and method for automated detection of never-pay data sets
US20080319922 *Dec 7, 2007Dec 25, 2008David LawrenceSystems and methods for automated political risk management
US20090024543 *Aug 6, 2008Jan 22, 2009Horowitz Kenneth AFinancial activity based on natural peril events
US20090024663 *Jul 21, 2008Jan 22, 2009Mcgovern Mark DTechniques for Information Security Assessment
US20090076883 *Sep 17, 2007Mar 19, 2009Max KilgerMultimedia engagement study
US20090089190 *Sep 26, 2008Apr 2, 2009Girulat Jr Rollin MSystems and methods for monitoring financial activities of consumers
US20090129377 *Nov 19, 2007May 21, 2009Simon ChamberlainService for mapping ip addresses to user segments
US20090177529 *Dec 29, 2008Jul 9, 2009Altaf HadiInternet eco system for transacting information and transactional data for compensation
US20090198611 *Mar 5, 2008Aug 6, 2009Sarah DaviesMethods and systems for score consistency
US20090259581 *Jun 17, 2009Oct 15, 2009Horowitz Kenneth AFinancial activity relating to natural peril events
US20090287612 *Jul 17, 2009Nov 19, 2009Horowitz Kenneth AFinancial activity based on natural weather events
US20090300577 *May 29, 2008Dec 3, 2009International Business Machines CorporationDetermining competence levels of factory teams working within a software factory
US20090300586 *May 29, 2008Dec 3, 2009International Business Machines CorporationStaged automated validation of work packets inputs and deliverables in a software factory
US20090327161 *Aug 28, 2009Dec 31, 2009Horowitz Kenneth AFinancial activity based on tropical weather events
US20100017252 *Jul 15, 2008Jan 21, 2010International Business Machines CorporationWork packet enabled active project schedule maintenance
US20100017782 *Jan 21, 2010International Business Machines CorporationConfiguring design centers, assembly lines and job shops of a global delivery network into "on demand" factories
US20100023919 *Jan 28, 2010International Business Machines CorporationApplication/service event root cause traceability causal and impact analyzer
US20100023920 *Jul 22, 2008Jan 28, 2010International Business Machines CorporationIntelligent job artifact set analyzer, optimizer and re-constructor
US20100023921 *Jul 23, 2008Jan 28, 2010International Business Machines CorporationSoftware factory semantic reconciliation of data models for work packets
US20100031226 *Jul 31, 2008Feb 4, 2010International Business Machines CorporationWork packet delegation in a software factory
US20100031234 *Feb 4, 2010International Business Machines CorporationSupporting a work packet request with a specifically tailored ide
US20100042552 *Feb 18, 2010Horowitz Kenneth AGraphical user interface for financial activity concerning tropical weather events
US20100114757 *Mar 20, 2009May 6, 2010G5 Capital Management LtdMethod of systematic risk management and system and computer program product thereof
US20100153303 *Feb 8, 2010Jun 17, 2010Horowitz Kenneth AFinancial activity based on natural events
US20100174638 *Jan 6, 2009Jul 8, 2010ConsumerInfo.comReport existence monitoring
US20100250469 *Sep 30, 2010Megdal Myles GComputer-Based Modeling of Spending Behaviors of Entities
US20100299246 *Jun 17, 2010Nov 25, 2010Experian Marketing Solutions, Inc.Systems and methods for determining thin-file records and determining thin-file risk levels
US20100299247 *Aug 9, 2010Nov 25, 2010Marie ConlinMethods and Systems for Characteristic Leveling
US20110054961 *Aug 28, 2009Mar 3, 2011Src, Inc.Adaptive Risk Analysis Engine
US20110131125 *Jun 2, 2011David LawrenceCorrespondent Bank Registry
US20110131136 *Jun 2, 2011David LawrenceRisk Management Customer Registry
US20110161245 *Jun 30, 2011Equitynet, LlcElectronic System for Analyzing the Risk of an Enterprise
US20110184776 *Dec 23, 2010Jul 28, 2011Lee Scott SpradlingMethod and system of generating audit procedures and forms
US20110184851 *Oct 26, 2010Jul 28, 2011Megdal Myles GMethod and apparatus for rating asset-backed securities
US20110202457 *Aug 18, 2011David LawrenceSystems and Methods for Managing Risk Associated with a Geo-Political Area
US20110276363 *Nov 10, 2011Oracle International CorporationService level agreement construction
US20110307293 *Dec 15, 2011Smith J MartinMethod For Assessing And Communicating Organizational Human Error Risk And Its Causes
US20120101870 *Apr 26, 2012International Business Machines CorporationEstimating the Sensitivity of Enterprise Data
US20140297495 *Apr 23, 2011Oct 2, 2014Pankaj B. DalalMultidimensional risk analysis
CN102880926A *Jul 9, 2012Jan 16, 2013华迪计算机集团有限公司Business information data auditing method and device
WO2007106787A2 *Mar 12, 2007Sep 20, 2007Vantagescore Solutions, LlcMethods and systems for characteristic leveling
Classifications
U.S. Classification705/38
International ClassificationG06F9/06, G06Q40/00
Cooperative ClassificationG06Q40/025, G06Q40/02
European ClassificationG06Q40/02, G06Q40/025